Article ID Journal Published Year Pages File Type
9506915 Applied Mathematics and Computation 2005 6 Pages PDF
Abstract
Recently, Hsu et al. showed that Ku and Wang's authenticated key agreement protocol is vulnerable to the modification attack and then proposed an improved protocol, called HWWM protocol. In this paper, we argue that the HWWM protocol is still vulnerable to the modification attack and cannot also withstand the password guessing attack. Then, we propose an improved protocol to solve these problems.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , ,